Tips for using smart phone security

Source: Internet
Author: User

A recent global survey on "Modern fans" shows that mobile devices are at the core of concerts, sports events, and festivals. However, with the gradual expansion of Functions of smartphones and other mobile devices, the related security threats are also increasing. Experts remind fans of potential security threats, including the loss and theft of mobile devices and the increasing number of Online scams. At the same time, network security experts also shared professional suggestions and security protection tips. Definition of "Contemporary fans"-Mr. and Ms. who recently participated in concerts, large-scale sports events, and festivals in 11 countries around the world (including China. This large survey targets 18 to 64 years of age with smartphones, individuals who have participated in at least two major concerts, professional sports competitions, or cultural/art festival celebrations in the past two years have also made a special survey on the Chinese market, smartphones are undoubtedly the favorites of Chinese fans. The survey data in China is as follows: lighters and cameras are outdated: 61% of the fans of today's smartphone surveys have said it is important to carry your smartphone with you during concerts, large events, and festivals. In fact, 97% of people will carry mobile phones with a ratio higher than other items, such as cash, creden, credit cards, and debit cards. • Today's fans have achieved mobile digitalization. 32% of people use their smartphones to pass in to the event, and 21% of fans use their mobile phones to buy various items at the event. • 85% of people took photos and videos at the event and 68% shared the photos on social media channels. Compared with men, women prefer to post activity photos and status updates in the network space, and promptly log on to social media websites. Electronic ticket scalpers are on the rise • 35% of the respondents report that they have heard or personally experienced the failure to fulfill all admission commitments they received when purchasing tickets. • 63% of problematic tickets are bought through online transactions. The scalpers who sell tickets outside the concert, large-scale events, and festival events can buy 59% problematic tickets. Dangerous digital behavior is common. More than 1/3 (34%) of contemporary fans admit that they have not used passwords to protect their smartphones, and 25% of them have not taken any action to prevent the loss or theft of their mobile phones. • 46% of Contemporary Chinese fans have experienced smartphone theft, loss, or misplacement. • Public Transportation facilities are a hotbed of lost, stolen, or misplaced smartphones. In the world and in China, the loss of smartphones in the public transportation system is much more than that in other environments, such as buses and taxis. Mobile apps can be icing on the cake-you can also draw a snake to add enough • 86% of fans of mobile apps that have downloaded concerts, large sports events, and festivals said they were involved in the process more exciting. However, 33% of people reported that these mobile apps sent spam information to them after the event, and 11% said they regretted downloading the mobile app. Better security awareness for Young People • Contemporary fans younger than 30 years old are more aware of their smart phones than those older than 50 years old. Although more young people say that smart phones are important in concert, large-scale sports events, and festivals, but at the same time, their mobile phones are more likely to be stolen, lost or misplaced. In response to the above situation, we would like to remind fans of possible security threats during future activities, including the loss and theft of mobile devices and the increasing number of Online scams. Specific measures include: more care should be taken out of the entrance security check: Online Security Measures for large-scale activities • information sharing should be cautious. Enable Privacy Protection Settings on your social network to ensure that you know who can access the information. In addition, think twice before posting your real-time location or photo on a social network. Seemingly harmless behavior may make others know that you have no time to care about other things or that no one stays at home. • High-strength passwords ensure security. Use a high-intensity complex password to protect your device and regularly update the password combination. This makes it more difficult for others to obtain your personal information through a lost or stolen mobile phone. • You can share drinks, not your bank information. Before using the public wireless Internet service to read emails or view bank account information, please consider it again. Cyber Criminals can "snap" sensitive information through a network environment without security protection. • The Lost and Found personnel take the lead. Install the security software in advance. Once your mobile phone or tablet is lost or stolen, you can remotely locate, lock, or even delete all information to ensure that others cannot access your personal data. E-ticket scams are becoming increasingly rampant: how to pretend to be true • Easy to click, serious consequences. Online scams implemented through social media have become increasingly common. For example, some posts encourage you to click the "love this band" link to get free admission tickets. Please be careful with this behavior; we recommend that you go directly to the band's social media homepage or website to verify if it is true. • The fare is too low to be true. This is often a scam if you find that the price of your concert tickets for a year is as low as unbelievable. We recommend that you use a credit card to purchase tickets. Unlike debit cards or cash, credit cards can be protected when the buyer is cheated. • Exercise caution when selecting a ticket sales website. If you want to purchase tickets through a website you have never heard of, please be careful. The ads on these websites may mark very cheap fares, but in the end it will make people spend more. We recommend that you select a well-known seller and ensure that the seller has security measures. • Be careful with scams and pay attention to details. Before entering your credit card information, check whether the seller has a trusted logo such as the Norton cybersecurity protection badge to ensure that the website is a trusted website. In addition, if "HTTPS" is displayed in the address bar, this table or webpage has higher security measures.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.